Security Requirement Engineering at a Telecom Provider

  • Authors:
  • Albin Zuccato;Viktor Endersz;Nils Daniels

  • Affiliations:
  • -;-;-

  • Venue:
  • ARES '08 Proceedings of the 2008 Third International Conference on Availability, Reliability and Security
  • Year:
  • 2008

Quantified Score

Hi-index 0.02

Visualization

Abstract

To offer competitive products and services in the telecom business information security serves as an enabler and competitive factor. Unfortunately, traditional risk analysis and security engineering methods have shown to suffer from several shortcomings when applied to the telecom business. To overcome these shortcomings we propose a security engineering method called SKYDD covering information, infrastructure, and business requirements based on information classification. The method uses a combination of reference tables and checklists and addresses many of the shortcomings of traditional methods. Well-integrated in to the development process SKYDD has proven to simplify security requirement gathering, reduce lead times and provide consistent requirements across different projects and project organizations, much of this due to the fact that the method is designed to be used by non-security experts.